A simple provably secure key exchange scheme based on the learning with errors problem J Ding, X Xie, X Lin Cryptology ePrint Archive, 2012 | 339 | 2012 |
Zkcnn: Zero knowledge proofs for convolutional neural network predictions and accuracy T Liu, X Xie, Y Zhang Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 95 | 2021 |
An efficient NIZK scheme for privacy-preserving transactions over account-model blockchain S Ma, Y Deng, D He, J Zhang, X Xie IEEE Transactions on Dependable and Secure Computing 18 (2), 641-651, 2020 | 85 | 2020 |
Mystique: Efficient conversions for {Zero-Knowledge} proofs with applications to machine learning C Weng, K Yang, X Xie, J Katz, X Wang 30th USENIX Security Symposium (USENIX Security 21), 501-518, 2021 | 84 | 2021 |
Structural lattice reduction: generalized worst-case to average-case reductions and homomorphic cryptosystems N Gama, M Izabachene, PQ Nguyen, X Xie Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016 | 74 | 2016 |
Blockchain-based system for secure outsourcing of bilinear pairings C Lin, D He, X Huang, X Xie, KKR Choo Information Sciences 527, 590-601, 2020 | 65 | 2020 |
Doubly efficient interactive proofs for general arithmetic circuits with linear prover time J Zhang, T Liu, W Wang, Y Zhang, D Song, X Xie, Y Zhang Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 47 | 2021 |
Zero knowledge proofs from Ring-LWE X Xie, R Xue, M Wang Cryptology and Network Security: 12th International Conference, CANS 2013 …, 2013 | 40 | 2013 |
Deterministic public key encryption and identity-based encryption from lattices in the auxiliary-input setting X Xie, R Xue, R Zhang Security and Cryptography for Networks: 8th International Conference, SCN …, 2012 | 37 | 2012 |
Ppchain: A privacy-preserving permissioned blockchain architecture for cryptocurrency and other regulated applications C Lin, D He, X Huang, X Xie, KKR Choo IEEE Systems Journal 15 (3), 4367-4378, 2020 | 29 | 2020 |
TOTA: fully homomorphic encryption with smaller parameters and stronger security Z Yang, X Xie, H Shen, S Chen, J Zhou Cryptology ePrint Archive, 2021 | 27 | 2021 |
Efficient online-friendly two-party ECDSA signature H Xue, MH Au, X Xie, TH Yuen, H Cui Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 24 | 2021 |
AntMan: Interactive zero-knowledge proofs with sublinear communication C Weng, K Yang, Z Yang, X Xie, X Wang Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 22 | 2022 |
Compact zero-knowledge proofs for threshold ECDSA with trustless setup TH Yuen, H Cui, X Xie IACR International Conference on Public-Key Cryptography, 481-511, 2021 | 21 | 2021 |
Promise -Protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class Groups Y Deng, S Ma, X Zhang, H Wang, X Song, X Xie International Conference on the Theory and Application of Cryptology and …, 2021 | 13 | 2021 |
Efficient threshold encryption from lossy trapdoor functions X Xie, R Xue, R Zhang Post-Quantum Cryptography: 4th International Workshop, PQCrypto 2011, Taipei …, 2011 | 13 | 2011 |
Half-tree: Halving the cost of tree expansion in cot and dpf X Guo, K Yang, X Wang, W Zhang, X Xie, J Zhang, Z Liu Annual International Conference on the Theory and Applications of …, 2023 | 12 | 2023 |
Leaf: A faster secure search algorithm via localization, extraction, and reconstruction R Wen, Y Yu, X Xie, Y Zhang Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 10 | 2020 |
Privacy-preserving computation in the post-quantum era Y Yu, X Xie National Science Review 8 (9), nwab115, 2021 | 9 | 2021 |
Lightweight authentication of web data via garble-then-prove X Xie, K Yang, X Wang, Y Yu Cryptology ePrint Archive, 2023 | 7 | 2023 |